Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

of

Privacy in a digital world Slide 1 Privacy in a digital world Slide 2 Privacy in a digital world Slide 3 Privacy in a digital world Slide 4 Privacy in a digital world Slide 5 Privacy in a digital world Slide 6 Privacy in a digital world Slide 7 Privacy in a digital world Slide 8 Privacy in a digital world Slide 9
Upcoming SlideShare
Urban indicators, city benchmarking, and real time dashboards: Knowing and governing cities through open and big data
Next
Download to read offline and view in fullscreen.

1 Like

Share

Download to read offline

Privacy in a digital world

Download to read offline

Slides from the Privacy: Insights from Lawyers and Technologiest at Maynooth University, July 1st 2015. The talk argues that privacy is multidimensional in nature; notions and practices of privacy are changing rapidly; has all kinds of direct and indirect effects; technology and industry are running ahead of legislators; there is no teleological inevitability to the emerging privacy landscape; it is incumbent on states to address privacy issues and to find a balance with respect to interests of citizens, states and industry.

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Privacy in a digital world

  1. 1. Privacy in a digital world Rob Kitchin NIRSA, National University of Ireland Maynooth
  2. 2. Introduction • Digital footprints (data individuals leave behind) • Data shadows (information about individuals generated by others) • Unique IDs for people, institutions, objects, interactions, transactions and territories • Increasingly being harvested, combined, analyzed, acted upon
  3. 3. Fair Information Practice Principles Principle Description Notice Individuals are informed that data are being generated and the purpose to which the data will be put Choice Individuals have the choice to opt-in or opt-out as to whether and how their data will be used or disclosed Consent Data are only generated and disclosed with the consent of individuals Security Data are protected from loss, misuse, unauthorized access, disclosure, alteration and destruction Integrity Data are reliable, accurate, complete and current Access Individuals can access, check and verify data about themselves Accountability The data holder is accountable for ensuring the above principles and has mechanisms in place to assure compliance
  4. 4. Data type Data collected by Uber android app (from Hein 2014) Accounts log email log App Activity name, package name, process number of activity, processed id App Data Usage Cache size, code size, data size, name, package name App Install installed at, name, package name, unknown sources enabled, version code, version name Battery health, level, plugged, present, scale, status, technology, temperature, voltage Device Info board, brand, build version, cell number, device, device type, display, fingerprint, IP, MAC address, manufacturer, model, OS platform, product, SDK code, total disk space, unknown sources enabled GPS accuracy, altitude, latitude, longitude, provider, speed MMS from number, MMS at, MMS type, service number, to number NetData bytes received, bytes sent, connection type, interface type PhoneCall call duration, called at, from number, phone call type, to number SMS from number, service number, SMS at, SMS type, to number TelephonyInfo cell tower ID, cell tower latitude, cell tower longitude, IMEI, ISO country code, local area code, MEID, mobile country code, mobile network code, network name, network type, phone type, SIM serial number, SIM state, subscriber ID WifiConnection BSSID, IP, linkspeed, MAC addr, network ID, RSSI, SSID WifiNeighbors BSSID, capabilities, frequency, level, SSID Root Check root status code, root status reason code, root version, sig file version Malware Info algorithm confidence, app list, found malware, malware SDK version, package list, reason code, service list, sigfile version
  5. 5. A Taxonomy of Privacy (compiled from Solove 2006) Domain Privacy breach Description Information Collection Surveillance Watching, listening to, or recording of an individual’s activities Interrogation Various forms of questioning or probing for information Information Processing Aggregation The combination of various pieces of data about a person Identification Linking information to particular individuals Insecurity Carelessness in protecting stored information from leaks and improper access Secondary Use Use of information collected for one purpose for a different purpose without the data subject’s consent Exclusion Failure to allow the data subject to know about the data that others have about her and participate in its handling and use, including being barred from being able to access and correct errors Information Dissemination Breach of Confidentiality Breaking a promise to keep a person’s information confidential Disclosure Revelation of information about a person that impacts the way others judge her character Exposure Revealing another’s nudity, grief, or bodily functions Increased Accessibility Amplifying the accessibility of information Blackmail Threat to disclose personal information Appropriation The use of the data subject’s identity to serve the aims and interests of another Distortion Dissemination of false or misleading information about individuals Invasion Intrusion Invasive acts that disturb one’s tranquillity or solitude Decisional Interference Incursion into the data subject’s decisions regarding her private
  6. 6. Loss of privacy effects • Extensive dataveillance/surveillance • social sorting • control creep • dynamic pricing • anticipatory governance • data security/protection – cybercrimes
  7. 7. The principles of Privacy by Design Principle Description Proactive not reactive; preventative not remedial IT systems should seek to anticipate privacy concerns rather than seeking to resolve privacy infractions once they have incurred Privacy as the default setting Privacy is automatically protected and does not require action on behalf of an individual Privacy embedded into design Privacy protections are core features of the design and architecture of IT systems and is not and bolt-on feature Full functionality - positive-sum, not zero-sum All legitimate interests and objectives are accommodated, rather than there being trade-offs between privacy and other considerations such as security End-to-end security - full lifecycle protection Privacy is embedded into the system from ingestion to disposal Visibility and transparency - keep it open Component parts and operations are visible and transparent to users and providers alike and are subject to independent verification Respect for user privacy - keep it user-centric A system should be built around, protect the interests, and empower individuals
  8. 8. Conclusion • Privacy is multidimensional in nature • Notions & practices of privacy are changing rapidly • Has all kinds of direct and indirect effects • Technology & industry are running ahead of legislators; as are states • There is no teleological inevitability to the emerging privacy landscape • It is incumbent on states to address privacy issues and to find a balance with respect to interests of citizens, states and industry
  9. 9. Rob.Kitchin@nuim.ie @robkitchin http://www.nuim.ie/progcity @progcity
  • TAKAYATERAKAWA

    Jun. 19, 2020

Slides from the Privacy: Insights from Lawyers and Technologiest at Maynooth University, July 1st 2015. The talk argues that privacy is multidimensional in nature; notions and practices of privacy are changing rapidly; has all kinds of direct and indirect effects; technology and industry are running ahead of legislators; there is no teleological inevitability to the emerging privacy landscape; it is incumbent on states to address privacy issues and to find a balance with respect to interests of citizens, states and industry.

Views

Total views

1,385

On Slideshare

0

From embeds

0

Number of embeds

92

Actions

Downloads

14

Shares

0

Comments

0

Likes

1

×